First published: Wed Jan 09 2019(Updated: )
An information exposure vulnerability exists in Jenkins 2.145 and earlier, LTS 2.138.1 and earlier, and the Stapler framework used by these releases, in core/src/main/java/org/kohsuke/stapler/RequestImpl.java, core/src/main/java/hudson/model/Descriptor.java that allows attackers with Overall/Administer permission or access to the local file system to obtain credentials entered by users if the form submission could not be successfully processed.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.main:jenkins-core | >=2.140<=2.145 | 2.146 |
maven/org.jenkins-ci.main:jenkins-core | <=2.138.1 | 2.138.2 |
Jenkins | <=2.138.1 | |
Jenkins | <=2.145 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000410 has a medium severity level indicating a moderate risk to affected Jenkins installations.
To resolve CVE-2018-1000410, upgrade Jenkins to version 2.146 or later, or LTS version 2.138.2 or later.
CVE-2018-1000410 affects Jenkins versions 2.145 and earlier, and LTS versions 2.138.1 and earlier.
CVE-2018-1000410 is an information exposure vulnerability that allows unauthorized access to sensitive information.
CVE-2018-1000410 can be exploited by attackers with Overall/Administer permissions on affected Jenkins instances.